MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 30efd997c49aae97766539c72d72529b06f1e8522ea84e71758cde4ed1846921. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 5
| SHA256 hash: | 30efd997c49aae97766539c72d72529b06f1e8522ea84e71758cde4ed1846921 |
|---|---|
| SHA3-384 hash: | d5b3f6612a1696bf4fac77fa60fa28ba87d4227688dd06627b8c3276be8e33c3a2dbbc3000553e22973935f77165ec8c |
| SHA1 hash: | 0f0be2cc28769ae61380f7ced287c37fe4912c02 |
| MD5 hash: | c833ae00d46ea45681b476c749d18ec8 |
| humanhash: | winner-lithium-white-lactose |
| File name: | Atrofierendes4.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 77'824 bytes |
| First seen: | 2020-06-02 11:09:37 UTC |
| Last seen: | 2020-06-02 11:32:34 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b19f388bc61b9221e1e97c4b680bf0ca (1 x GuLoader) |
| ssdeep | 768:J0Khc7416N8lBR2zI4Bk2Yukmzq7aBo227SkqcHQ568Rq1SJUYOFd7S+:eKFO8lLaya19BwqH68Rq1S9s |
| Threatray | 5'085 similar samples on MalwareBazaar |
| TLSH | 217349176D088E11D9B046701CA787AD2F16BC4C868A5E5F384E6E1BFF323B16C9D61D |
| Reporter | |
| Tags: | exe GuLoader WHO |
abuse_ch
Malspam distributing GuLoader:HELO: smtpgate04.genotec.ch
Sending IP: 81.221.254.53
From: resourceteam@worldhealth.org
Reply-To: victoria_bannister2009@hotmail.com
Subject: INTENTION FOR EXPRESSION OF INTEREST: WHO/2020/06/02/AA1
Attachment: world health organization proposal file.zip (contains "Atrofierendes4.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1wOlpmTA15MUHYuQiL4QonKzdP6YMl5Hx
Intelligence
File Origin
# of uploads :
2
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Gathering data
Threat name:
Win32.Trojan.Occamy
Status:
Malicious
First seen:
2020-06-02 22:00:00 UTC
AV detection:
15 of 31 (48.39%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 5'075 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.